Lines Matching full:be

7 .\" can be used freely for any purpose.  Any derived versions of this
8 .\" software must be clearly marked as such, and if the derived work is
9 .\" incompatible with the protocol description in the RFC file, it must be
28 .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
60 will be used.
71 host-specific declarations should be given near the beginning of the
78 Arguments may optionally be enclosed in double quotes
81 Configuration options may be separated by whitespace or
102 keyword) to be only for those hosts that match one of the patterns
104 If more than one pattern is provided, they should be separated by whitespace.
107 as a pattern can be used to provide global
116 A pattern entry may be negated by prefixing it with an exclamation mark
133 keyword) to be used only when the conditions following the
157 Other criteria may be combined arbitrarily.
164 Criteria may be negated by prepending an exclamation mark
173 This may be useful to specify conditions that work with canonical host
178 keyword requests that the configuration be re-parsed (regardless of whether
193 Commands containing whitespace characters must be quoted.
204 This may be convenient for varying the effective configuration on devices that
208 and so caution should be applied if using it to control security-sensitive
211 The other keywords' criteria must be single entries or comma-separated
242 (this keyword may be useful in system-wide
246 Specifies whether keys should be automatically added to a running
263 each use of the key must be confirmed, as if the
270 Alternately, this option may be specified as a time interval
277 after which it will automatically be removed.
278 The argument must be
299 will be disabled.
303 The argument must be
332 is enabled and the target hostname cannot be found in any of the domains
377 Specifies rules to determine whether CNAMEs should be followed when
392 to be canonicalized to names in the
400 causes no CNAMEs to be considered for canonicalization.
416 character, then the specified algorithms will be appended to the default set
420 character, then the specified algorithms (including wildcards) will be removed
428 A corresponding private key must be provided separately in order
453 configuration files; these certificates will be tried in sequence.
466 must be the special keyword
486 expires then all open channels will be closed.
487 Note that this global timeout is not matched by wildcards and must be
550 the check will not be executed.
555 Multiple ciphers must be comma-separated.
558 character, then the specified ciphers will be appended to the default set
562 character, then the specified ciphers (including wildcards) will be removed
566 character, then the specified ciphers will be placed at the head of the
590 The list of available ciphers may also be obtained using
594 specified in the configuration files or on the command line be
603 The argument must be
610 The argument must be
617 The argument must be an integer.
618 This may be useful in scripts if the connection sometimes fails.
652 cannot be opened,
659 display and agent forwarded will be the one belonging to the master
690 at least %h, %p, and %r (or alternatively %C) and be placed in a directory
702 then the master connection will not be placed into the background,
716 Specifies that a TCP port on the local machine be forwarded
721 The argument must be
725 IPv6 addresses can be specified by enclosing addresses in square brackets.
731 may be used to bind the connection to a specific address.
736 indicates that the listening port be bound for local use only, while an
739 indicates that the port should be available from all interfaces.
744 Multiple forwardings may be specified, and
745 additional forwardings can be given on the command line.
762 The argument must be
767 This option should be placed in the non-hostspecific section.
776 The argument should be a single character,
795 The argument must be
837 will wait for all remote port forwards to be successfully established
839 The argument to this keyword must be
848 will be forwarded to the remote machine.
849 The argument may be
858 Agent forwarding should be enabled with caution.
866 Specifies whether X11 connections will be automatically redirected
870 The argument must be
876 X11 forwarding should be enabled with caution.
880 An attacker may then be able to perform activities such as keystroke monitoring
892 after this time will be refused.
907 remote X11 clients will be considered untrusted and prevented
912 token used for the session will be set to expire after 20 minutes.
913 Remote clients will be refused access after this time.
925 can be used to specify that ssh
928 The argument must be
952 These hashed names may be used normally by
961 will not be converted automatically,
962 but may be manually hashed using
965 Specifies the signature algorithms that will be used for hostbased
969 character, then the specified signature algorithms will be appended
974 will be removed from the default set instead of replacing them.
977 character, then the specified signature algorithms will be placed
1000 may be used to list supported signature algorithms.
1005 The argument must be
1015 character, then the specified signature algorithms will be appended to
1020 will be removed from the default set instead of replacing them.
1023 character, then the specified signature algorithms will be placed
1045 The list of available signature algorithms may also be obtained using
1048 Specifies an alias that should be used instead of the
1055 This can be used to specify nicknames or abbreviations for hosts.
1082 The argument to this keyword must be
1096 environment variable and can be used to select a specific agent.
1102 is specified, the location of the socket will be read from the
1107 character, then it will be treated as an environment variable containing
1134 will be used for authentication unless
1154 may be used to indicate no identity files should be loaded.
1158 identities will be tried in sequence.
1165 may be used in conjunction with
1169 may also be used in conjunction with
1174 Specifies a pattern-list of unknown options to be ignored if they are
1176 This may be used to suppress errors if
1182 be listed early in the configuration file as it will not be applied
1186 Multiple pathnames may be specified and each pathname may contain
1191 Wildcards will be expanded and processed in lexical order.
1192 Files without absolute paths are assumed to be in
1248 The argument to this keyword must be
1257 Multiple method names must be comma-separated.
1261 it may be zero or more of:
1267 Multiple algorithms must be comma-separated.
1270 character, then the specified algorithms will be appended to the default set
1274 character, then the specified algorithms (including wildcards) will be removed
1278 character, then the specified algorithms will be placed at the head of the
1291 The list of available key exchange algorithms may also be obtained using
1310 The command may be invoked multiple times per connection: once when preparing
1333 It should not be used for interactive commands.
1339 Specifies that a TCP port on the local machine be forwarded over
1341 The first argument specifies the listener and may be
1346 The second argument is the destination and may be
1350 IPv6 addresses can be specified by enclosing addresses in square brackets.
1351 Multiple forwardings may be specified, and additional forwardings can be
1359 may be used to bind the connection to a specific address.
1364 indicates that the listening port be bound for local use only, while an
1367 indicates that the port should be available from all interfaces.
1402 Multiple algorithms must be comma-separated.
1405 character, then the specified algorithms will be appended to the default set
1409 character, then the specified algorithms (including wildcards) will be removed
1413 character, then the specified algorithms will be placed at the head of the
1430 The list of available MAC algorithms may also be obtained using
1434 The argument to this keyword must be
1441 The argument to this keyword must be an integer.
1452 The argument to this keyword must be
1464 The argument to this keyword must be
1476 The argument must be
1485 The forwarding specification must be one of the following forms:
1505 Multiple forwards may be specified by separating them with whitespace.
1508 can be used to remove all restrictions and permit any forwarding requests.
1511 can be used to prohibit all forwarding requests.
1514 can be used for host or port to allow all hosts or ports respectively.
1520 to indicate that no provider should be used (the default).
1552 The command can be basically anything,
1559 Host key management will be done using the
1587 Multiple proxies may be separated by comma characters and will be visited
1610 should be used if specific configuration is required for jump hosts.
1620 Specifies the signature algorithms that will be used for public key
1624 character, then the algorithms after it will be appended to the default
1628 character, then the specified algorithms (including wildcards) will be removed
1632 character, then the specified algorithms will be placed at the head of the
1651 The list of available signature algorithms may also be obtained using
1655 The argument to this keyword must be
1668 Specifies the maximum amount of data that may be transmitted or received
1702 Specifies that a TCP port on the remote machine be forwarded over
1704 The remote port may either be forwarded to a specified host and port
1707 The first argument is the listening specification and may be
1712 If forwarding to a specific destination then the second argument must be
1716 will be established as a SOCKS proxy.
1717 When acting as a SOCKS proxy, the destination of the connection can be
1721 IPv6 addresses can be specified by enclosing addresses in square brackets.
1722 Multiple forwardings may be specified, and additional
1723 forwardings can be given on the command line.
1724 Privileged ports can be forwarded only when
1735 the listen port will be dynamically allocated on the server and reported
1755 The argument may be one of:
1774 User authentication keys smaller than this limit will be ignored.
1776 connection to be terminated.
1780 Note that this limit may only be raised from the default.
1783 Keys listed in this file will be refused for host authentication.
1785 then host authentication will be refused for all hosts.
1786 Keys may be specified as a text file, listing one public key per line, or as
1800 Specifies a path to a library that will be used when loading any
1806 character, then it will be treated as an environment variable containing
1811 should be sent to the server.
1812 The server must also support it, and the server must be configured to
1824 Multiple environment variables may be separated by whitespace or spread
1839 Sets the number of server alive messages (see below) which may be
1850 and therefore will not be spoofable.
1871 is 0, indicating that these messages will not be sent to the server.
1873 May be used to either request invocation of a subsystem on the remote system,
1876 The argument to this keyword must be
1894 variable, the server must be prepared to accept the environment variable.
1901 option must be used when
1904 The argument to this keyword must be
1929 will be unable to forward the port to the Unix-domain socket file.
1932 The argument must be
1945 though it can be annoying when the
1969 will be added to the user known host files only after the user
1973 known hosts will be verified automatically in all cases.
1984 of the machines will be properly noticed.
1995 To disable TCP keepalive messages, the value should be set to
2001 Specify a configuration tag name that may be later used by a
2008 The argument must be
2029 The argument must be
2033 The devices may be specified by numerical ID or the keyword
2048 The argument must be
2072 will be set to
2082 and will be disabled if it is enabled.
2091 This can be useful when a different user name is used on different machines.
2118 Insecure fingerprints will be handled as if this option was set to
2122 information on fingerprint match will be displayed, but the user will still
2143 only the fingerprint string will be printed for unknown host keys.
2163 the following pattern could be used:
2175 Patterns within pattern-lists may be negated
2179 to allow a key to be used from anywhere within an organization
2183 the following entry (in authorized_keys) could be used:
2305 Arguments to some keywords can be expanded at runtime from environment
2311 If a specified environment variable does not exist then an error will be
2312 returned and the setting for that keyword will be ignored.
2341 This file must be world-readable.